Four major companies(CDON, Tele2, Dagens, COOP) have been restricted from accessing Google Analytics and fined for violating the law by transferring personal data to third countries. Google...
Based on recent reports from Cyble, there has been a large attack vector for threat actors in the Solar industry’s PV (Photo-Voltaic) diagnostic and monitoring systems....
The precautions and techniques that have been put in place for the protection of email messages from unauthorized access, interception or manipulation is regarded as email...
White snake stealer, an info stealer which has enhanced features now able to target both Windows and Linux platforms posing a significant threat to user privacy...
Phishing attacks are online scams in which hackers pretend to represent reliable organizations to trick victims into disclosing private information like passwords or credit card numbers....
Anonymous Sudan recently announced on Telegram the sale of a valuable Microsoft user data collection with a price tag of $50,000 for the full database. The...
A Spanish-based threat actor Neo_Net has conducted campaigns against financial institutions and banks and achieved the highest success rate in spite of its unsophisticated tools. The...
Hundreds of thousands of FortiGate firewalls are vulnerable to a critical security issue identified as CVE-2023-27997, almost a month after Fortinet released an update that addresses the...
Recently, the cybersecurity researchers at ASEC (AhnLab Security Emergency Response Center) found that the operators of Crysis ransomware are actively utilizing the Venus ransomware in their...
DNS flaws are very common on web applications where the DNS resolvers are vulnerable to Kaminsky attacks. If threat actors are able to predict portions of...
Recent Comments